Six-pound laptop computers can each carry as much information as several five-foot filing cabinets. How perfect they are for transporting information, across town or across the ocean.

Thieves see them the same way. A stolen laptop computer or mobile device can yield a rich trove of data. With stolen information, thieves can fraudulently use information to steal money, or worse, damage brands and corporate goodwill.

Comodo Security Solutions, Inc.'s Disk Encryption offers easy-to-use protection for businesses who want to protect their information from falling into the wrong hands. Using security algorithms, Comodo Disk Encryption encrypts any drive partition or even virtual partitions, without disrupting computer usage or performance.

For added security, users and administrators can choose to require a USB memory stick in order to access the encrypted drives. The USB stick acts as a key to unlock the protected information.

Combining password and USB authentication produces the most secure disk encryption Comodo offers. Using both at the same time qualifies as "two-factor authentication" required by many regulations such as the PCI DSS and FFIEC.

Comodo Disk Encryption can be used on mobile and desktop computers alike. With Comodo Disk Encryption, users have powerful control over their machines, including specifying who may start a specific computer, or keeping one partition of a shared computer "off limits." USB key users who want to make their information unrecoverable — anywhere — need only destroy their USB keys.

Comodo Disk Encryption continually protects sensitive data, giving the computer user both powerful control and unprecedented freedom to carry it where it is needed without fear of compromise.